Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double factor combined public key generating and authenticating method

An authentication method and a technology of combining public keys, which are applied in the field of public key cryptography and authentication, can solve the problems of private keys without exclusive rights or privacy, collusion attacks, and affecting large-scale applications.

Inactive Publication Date: 2009-04-29
BEIJING E HENXEN AUTHENTICATION TECH
View PDF0 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In all identity-based public key cryptography, the entity’s private key is generated by the key management center based on the identity and the master key. The private key is the linear sum of the seed private key, which theoretically has the possibility of being attacked by collusion, which will affect its large-scale application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double factor combined public key generating and authenticating method
  • Double factor combined public key generating and authenticating method
  • Double factor combined public key generating and authenticating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096]The two factor combined public key cryptosystem (Two Factor Combined Public Key System, referred to as TF-CPK) proposed by the present invention is composed of two mutually independent public keys—the self-defined random public key and the identification public key, involving: mathematics Fundamentals, key combination laws, random numbers, identities, hash functions, seed keys, etc. Hereinafter, taking elliptic curve cryptography and discrete logarithm as examples, and in conjunction with the accompanying drawings, the specific implementation of the key generation method according to the present invention will be further described in detail from various aspects. It should be noted that the specific implementation of the two-factor combined public key technology and identification authentication system according to the present invention is only an example, but the present invention is not limited to this specific implementation.

[0097] 1. Several elements of the two-fac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an identification key and random key complicated two-factor combined public key system and an authentication method. The identification keys are generated by selecting and combining seed key sets by the user identification generated sequence; the random keys are generated on the basis of one-way function principle which is also the basis of general public key ciphers. Multiple complication modes of the random key and the identification key can not only satisfy the requirement of centralized management, but also provide the proprietary right of private keys for users. An authentication system based on the key generating method has the characteristics of the identification authentication which does not need a third part certificate to prove and high randomization and privacy of general public key cipher and random private key. The present invention can be widely applied to authentication of systems with various scales, especially the authentication of public systems with enormous scale, and the applicable fields comprises reliable access, reliable load, electronic bank, reliable transaction, reliable logistics and the like.

Description

technical field [0001] The invention relates to the field of public key cryptography and authentication, and relates to a double public key key generation and authentication method based on an identification key and a random key. Background technique [0002] The authentication system is mainly used to provide authenticity proof and security guarantee, and is the technical basis for realizing information security (Information Security) and information assurance (Information Assurance). The core of the authentication system is public key cryptography. The core issues that need to be solved at present are: one is to be able to support the authentication of a large-scale public network, and the other is to ensure the privacy of the user's private key under the centralized management mode. Around the construction of the authentication system, two major technical systems have been formed: one is the certificate authentication system based on traditional public key cryptography, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/32H04L9/3247H04L9/083H04L2209/56H04L9/08
Inventor 陈华平南相浩
Owner BEIJING E HENXEN AUTHENTICATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products